|
Message-ID: <20190325205838.GA27235@openwall.com> Date: Mon, 25 Mar 2019 21:58:38 +0100 From: Solar Designer <solar@...nwall.com> To: john-users@...ts.openwall.com Subject: Re: PGP cracking, .asc and .skr files unrecognised by Gpg2john, "No password hashes loaded" Hello George, I'm really sorry we didn't get back to you on this sooner. Please see below: On Wed, Jan 02, 2019 at 04:03:23PM +0100, George Alaerts wrote: > I have .asc and .skr files generated by "PGPfreeware 7.0.3 for > non-commercial use". After running > Gpg2john secring.skr > George Did this produce any output on the terminal? What's the size of the "George" file? > john --wordlist=password.lst --format=gpg George > I got the message, > "No password hashes loaded (see FAQ)" > I've checked the FAQ.txt and can't find a solution. Can anybody help? Thank > you very much! > I've attached a sample key below. > I'm using "John the Ripper 1.8.0-jumbo-1 (Windows binaries, ZIP, 34 MB)" on > Windows 10. While 1.8.0-jumbo-1 is the latest build for Windows that we host directly on the Openwall website currently, it's pretty old, and we recommend that people use or at least try a newer revision of jumbo, especially if this old build doesn't work for them. 1.8.0-jumbo-1 is old enough that we wouldn't care to see if it has a bug or not, etc. You can find a newer binary build here: https://download.openwall.net/pub/projects/john/contrib/windows/ Currently, it is john-1.8.0.13-jumbo-b7eae75d7 for 64-bit Windows. Or you can indeed build the latest bleeding-jumbo off GitHub from source on your own. > sample key from my samplekey.asc file for you to try: Thank you! I've just tested this as follows using recent bleeding-jumbo, and the password gets cracked instantly: [solar@...er run]$ cat pw-pgp-in -----BEGIN PGP PRIVATE KEY BLOCK----- Version: PGPfreeware 7.0.3 for non-commercial use <http://www.pgp.com> lQHPBFwsuwIRBADv58mMHtZC4qtgeaFtBCaZY1AUCtmTmnMi67ETP9xdGu1bZlS1 UdWQ7Lo/g688gi+aOG+oG72Px3aE4ZHaI0e7+gWA5ND2P9UdZ2wNkulZ5HzNjTPe vM6FWne0Jku61qWkDNIl/ZM+HKPmBbf0lPjgrWb47j5EeVhh2S8jMvBQsQCg/65O uDTelX6KT+JIBN9qmRG6W6EEAJ47hMLG8gA6nQCdUNw9y/DavQ+brJin+dt8UKBE 20NeObL6KTdEjwazNePmWf7mIwGO6aExxdYYLhM5zVa9bwRdtMpd11CHcgqcqxhs 9mgghfOqM0fbS3a+LydMvcohJ9/HCYOL1xjl/XpYkulTY3UDncmMyqVzdF+jK1Gx tDnuA/9EDfu5qij7RnumK0mTcLP2WNaUqwY7NBIZX8LkCJihvXNoPJjy0NQSqgZZ wJd7BX0iFR/PX348ubd9jCOsPxseM9Rzf3Q6DEjUsDN4X68ryR8eIj+NUotC6cK0 nJRs9NhAkZlnE8VZDiFBV8+zwhF86nzS8IcjaZiNBfraSI5cXP8DAwKrrGkvexjV uWDKNT4j0MqhP22Hb6HzOFNO4WmtUl3Fom3JuQSoltHGR7Qic2FtcGxlIGtleSA8 c2FtcGxla2V5QGhvdG1haWwuY29tPp0CUQRcLLsCEAgA9kJXtwh/CBdyorrWqULz Bej5UxE5T7bxbrlLOCDaAadWoxTpj0BV89AHxstDqZSt90xkhkn4DIO9ZekX1KHT UPj1WV/cdlJPPT2N286Z4VeSWc39uK50T8X8dryDxUcwYc58yWb/Ffm7/ZFexwGq 01uejaClcjrUGvC/RgBYK+X0iP1YTknbzSC0neSRBzZrM2w4DUUdD3yIsxx8Wy2O 9vPJI8BD8KVbGI2Ou1WMuF040zT9fBdXQ6MdGGzeMyEstSr/POGxKUAYEY18hKcK ctaGxAMZyAcpesqVDNmWn6vQClCbAkbTCD1mpF1Bn5x8vYlLIhkmuquiXsNV6TIL OwACAggAhBimOY7Qeb5DhcZII2dQ522LXA3XeAlTYeUHkEXI4BQqqYql3BCu6pFc svfacIfst29hpcDE+aXWQcr1VQ5MwlViurw6ZaTvp6vHMu9MoUdeDSbv0lHwAbLw SkVNqX8pyeUObvd586+DdET0x+rdVBOodlVVNgn04FxjA959KjM9LJmKdb6SzoMp ZvueAKJ2EWY2kj5OGVfHXEu11poEuaRHNMGvYPzQOlD2r7ltGwu8tPnir1Qmpvro BSe3zb0cNn4VjPQlvbugo4gGYweLSqjnkzM/GcdG9TkkHOi8afC1MgW80Jl841f5 kXFh19ZJMRo8CkAzl8u0s/EZKgkeOv8DAwKALZavF6cAQWCSdoku/hZc4QlNGLzF P/gM6wPZtiTkKBEqip7w8VtB0BIsm5qmvgNjUY2XbG+ksGKzTxlGJDqB =m4Th -----END PGP PRIVATE KEY BLOCK----- [solar@...er run]$ ./gpg2john pw-pgp-in > pw File pw-pgp-in [solar@...er run]$ ./john pw Warning: detected hash type "gpg", but the string is also recognized as "gpg-opencl" Use the "--format=gpg-opencl" option to force loading these as that type instead Using default input encoding: UTF-8 Loaded 1 password hash (gpg, OpenPGP / GnuPG Secret Key [32/64]) Cost 1 (s2k-count) is 65536 for all loaded hashes Cost 2 (hash algorithm [1:MD5 2:SHA1 3:RIPEMD160 8:SHA256 9:SHA384 10:SHA512 11:SHA224]) is 2 for all loaded hashes Cost 3 (cipher algorithm [1:IDEA 2:3DES 3:CAST5 4:Blowfish 7:AES128 8:AES192 9:AES256 10:Twofish 11:Camellia128 12:Camellia192 13:Camellia256]) is 3 for all loaded hashes Will run 32 OpenMP threads Proceeding with single, rules:Single Press 'q' or Ctrl-C to abort, almost any other key for status sample key (sample key) 1g 0:00:00:00 DONE 1/3 (2019-03-25 21:01) 4.761g/s 152.3p/s 152.3c/s 152.3C/s sample key..samplekeykey Use the "--show" option to display all of the cracked passwords reliably Session completed Three things for us (JtR jumbo developers) to note and possibly fix: 1. I had to insert an empty line after the "Version: " line. Maybe we shouldn't require that empty line, especially if PGPfreeware produces output without that empty line? 2. Having both a private and a public key in the file made gpg2john refuse to process the file. I had to delete the public key from there, even though I initially tried putting both in there. Maybe we should have gpg2john silently skip the public key(s), or in general skip (but mention on stderr?) whatever it can't recognize? 3. gpg2john outputs an empty line and "File ..." to stderr. I doubt this serves a purpose, and IIRC is inconsistent with our other *2john tools. Maybe we should drop that. Alexander
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.